100% found this document useful (1 vote)
427 views

Cyber Crime Quiz Question

The document contains a quiz about cyber crime and cyber security with multiple choice questions. It covers topics like cyber laws in India, types of cyber crimes, malware, VPNs, ransomware, firewalls, and ethical hacking. The quiz aims to test knowledge of common cyber security terms, threats, and best practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
427 views

Cyber Crime Quiz Question

The document contains a quiz about cyber crime and cyber security with multiple choice questions. It covers topics like cyber laws in India, types of cyber crimes, malware, VPNs, ransomware, firewalls, and ethical hacking. The quiz aims to test knowledge of common cyber security terms, threats, and best practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber Crime Quiz Question

1. What type of cyber-crime, its law and punishments does section 66 of Indian IT hacks holds?
a. Cracking or illegally hack into any system
b. Putting antivirus into victim
c. Stealing data
d. Stealing hardware componets

Answer: Cracking or illegally hack into any system

2. You receive an email inviting you to apply for a compensation for financial losses during the pandemic. To
apply, you need to fill in a form with your personal details. What should you do?
a. Report it as phishing
b. Delete the message
c. Reply to the message and apply for the compensation scheme
d. Reply to the message telling the sender you won't fall for this trick

Answer: Report it as phishing

3. Which of the following is not done by cybercriminals?


a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system

Answer: Mass attack using Trojans as botnets

4. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008

Answer: India’s Information Technology (IT) Act, 2000

5. Which of the following is known as Malicious software?


A. illegal war
B. badware
C. malware
D. malicious ware

Answer Malware

6. What is the primary purpose of a VPN (Virtual Private Network) in cyber security?

a. Speedup internet connection


b. Encrypt and secure communication over the internet
c. Block malicious websites
d. Boost Wi-Fi signal strength
Answer: Encrypt and secure communication over the internet

7. What is the purpose of a CAPTCHA in online security?


A. Detecting malware
B. Authenticating users
C. Preventing Automated bots
D. All of the above

Answer: Preventing automated bots

8. Which of these groups exploit vulnerabilities?


A. Governments
B. Criminals
C. Hacktivists
D. All of the above

Answer: All of the above

9. What type of software infects a machine, locks the files, then asks for money?
A. Worm
B. Trojan
C. Ransomware
D. Browser Hijacker

Answer: Ransomware

10. What does the acronym AES stand for?


A. Automated Encryption Strength
B. Advanced Encryption Standard
C. Algorithm Encrypted System
D. Advanced Encryption Solution

Answer: Advanced Encryption Standard

11. What is the main purpose of a "sandbox" in cyber security?


A. A secure storage for passwords
B. Isolating and analyzing suspicious or untrusted programs
C. Creating a virtual playground for ethical hackers
D. Protecting against phishing attacks

Answer: Isolating and analyzing suspicious or untrusted programs

12. Which command can be used in DOS or Windows command Prompt to hide files?
A. Stealth [file/ directory]
B. Attrib +h [ file / directory]
C. Hide –h [file/ directory]
D. Attrib *h [ file / directory]

Answer: Attrib +h [ file / directory]


13. What is a worm that affects SQL servers?
A. SQL Slammer
B. Storm Worm
C. SQL Michelangelo
D. The Great Worm

Answer: SQL Slammer

14. What does the term "firewall" refer to in cyber security?


A. A protective suit worn by cybersecurity professionals
B. A physical barrier around computer servers
C. A security system that monitors and controls network traffic
D. Software for preventing computer overheating

Answer: A security system that monitors and controls network traffic

15. What is getting connected to a system without a username or password called?


A. Null session
B. Blank session
C. Admin Session
D. Bot session

Answer: Null Session

16. What is a group of computers networked together and used by hackers to steal information called?
A. Rootkit
B. Operating system
C. Botnet
D. DDos

Answer: Botnet

17. Why would a hacker use a proxy server?


A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.

Answer: To hide malicious activity on the network.

18. Which of the following is not a factor in securing the environment against an attack on security?
A. The education of the attacker
B. The system configuration
C. The network architecture
D. The business strategy of the company

Answer: The business strategy of the company


19. Attempting to gain access to a network using an employee’s credentials is called the _____________
mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking

Answer: Local networking

20. Which of the following is not a typical characteristic of an ethical hacker?


A. Excellent knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.

Answer: Has the highest level of security for the organization

21. What type of symmetric key algorithm using a streaming cipher to encrypt information?
A. RC$
B. Blowfish
C. SHA
D. MD5

Answer: RC$

22. What type of attack uses a fraudulent server with a relay address?
A. NTLM
B. MITM
C. NetBIOS
D. SMB

Answer: MITM

23. What type of attack uses a fraudulent server with a relay address?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.

Answer: Additional unused features on commercial software packages.

24. Why would a ping sweep be used?


A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To locate firewalls

Answer: To identify live systems


25. Which of the following will allow foot printing to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. ARIN

Answer: ARIN

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy